#PHPvulnerability

2025-03-11

Urgent: Mass exploitation of critical PHP vulnerability (CVE-2024-4577) confirmed; widespread attacks targeting Apache/PHP-CGI servers. #PHPvulnerability #Cybersecurity #CVE20244577

More details: rescana.com/post/critical-cve- - flagthis.com/news/10993

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2024-02-27

"LockBit's Bold Return: A Threat Renewed 🚨 #CyberAlert"

Despite recent crackdowns, the notorious LockBit ransomware gang has defiantly announced a comeback, threatening new cyber onslaughts on government sectors in the UK and USA. Leveraging a previously exploited PHP vulnerability, they've bounced back, boasting updated security measures and a new dark web haunt for victim listings. This follows a brief hiatus post-Operation Cronos, highlighting the resilient and adaptive nature of cyber threats today. LockBit's strategy now includes manual decryptor releases and rewards for vulnerability reports, underlining an intensified focus on operational security to thwart future law enforcement infiltrations. Stay vigilant, stay informed. #LockBit #CyberSecurity #RansomwareResurgence #ThreatIntelligence #DigitalDefense

Source: HackRead

Tags: #APT #CyberCrime #InfoSec #SecurityAwareness #CyberThreats #GovernmentSecurity #OperationalSecurity #PHPVulnerability 🌐🔒💡

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst